Patents by Inventor Abhishek Singh
Abhishek Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9065496Abstract: A system and method for diversity implementation are provided, where diversity gains are obtained by using a hybrid of the switching technique and the combining technique in conjunction with the use of a modal antenna. The antenna system includes multiple antennas including at least one modal antenna that has multiple modes, and a processor for selecting one or more modes from the multiple modes associated with each of the at least one modal antenna, combining modes to form one or more combinations of modes, the modes in each of the one or more combinations including one of the one or more selected modes associated with each of the at least one modal antenna, and selecting one of the one or more combinations that optimizes correlation and/or a quality metric for diversity.Type: GrantFiled: July 21, 2014Date of Patent: June 23, 2015Assignee: Ethertronics, Inc.Inventors: Sebastian Rowson, Jeffrey Shamblin, Laurent Desclos, Abhishek Singh
-
Patent number: 9049140Abstract: A source device obtains a data packet that includes both a destination address and a payload. The source device selects an exit point address of multiple exit point addresses corresponding to the destination address based on one or more policies. The source device encapsulates the data packet with a header that includes the selected exit point address, and the encapsulated data packet is provided to the backbone network. The encapsulated data packet is routed through the backbone network based on the exit point address, and an edge router of the backbone network identifies an interface of the edge router that corresponds to the exit point address. The header is removed from the encapsulated data packet, and the data packet is added to a buffer of the interface for routing to one or more other devices outside of the backbone network.Type: GrantFiled: November 18, 2010Date of Patent: June 2, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Abhishek Singh, Ming Zhang, Albert G. Greenberg, Parantap Lahiri, David A. Maltz, Srinivas Krishnan
-
Patent number: 9043306Abstract: A client application installed on end user computers generates metadata from the content of web pages visited by end users and provides the metadata to a search engine. When an end user visits a web page, the end user's computer downloads and displays the web page to the end user. The client application may simultaneously access the web page content and generate this metadata in the form of a content signature of the web page from the web page content. The client application then provides the content signature to a search engine. The search engine may employ content signatures to identify new web pages to crawl and index. Additionally, the search engine may employ content signatures to identify changes to web pages and determine the crawl frequency of web pages.Type: GrantFiled: August 23, 2010Date of Patent: May 26, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Fabrice Canel, Junaid Ahmed, Thomas Francis McElroy, Walter Sun, Kumar Chellapilla, Abhishek Singh, Vishnu Challam
-
Publication number: 20150112762Abstract: A system analyzes past sales data to identify those product assortments that may lead to the largest sales volume for the product category. The system estimates an incremental sales volume increase associated with each of one or more product assortments. The system may further identify which assortment will result in the largest sales volume for the product category, and may generate a ranking of the one or more assortments based on their associated incremental sales volume increase.Type: ApplicationFiled: October 18, 2013Publication date: April 23, 2015Applicant: Target Brands, Inc.Inventors: Maher Lahmar, Diptesh Basak, Somsubhra Sikdar, Abhishek Singh Verma
-
Publication number: 20150096022Abstract: Techniques for malware detection are described herein. According to one aspect, control logic determines an analysis plan for analyzing whether a specimen should be classified as malware, where the analysis plan identifies at least first and second analyses to be performed. Each of the first and second analyses identified in the analysis plan including one or both of a static analysis and a dynamic analysis. The first analysis is performed based on the analysis plan to identify suspicious indicators characteristics related to processing of the specimen. The second analysis is performed based on the analysis plan to identify unexpected behaviors having processing or communications anomalies. A classifier determines whether the specimen should be classified as malicious based on the static and dynamic analyses. The analysis plan, the indicators, the characteristics, and the anomalies are stored in a persistent memory.Type: ApplicationFiled: September 30, 2013Publication date: April 2, 2015Inventors: Michael Vincent, Ali Mesdaq, Emmanuel Thioux, Abhishek Singh, Sai Vashisht
-
Publication number: 20150094090Abstract: Various devices, systems and methods for obtaining a location from a cache on a device are described. In various embodiments, the obtained location is based on data generated at the mobile device. Additional embodiments relate to cache hit determination techniques and techniques for sharing, managing and prepropagating the cache.Type: ApplicationFiled: September 26, 2014Publication date: April 2, 2015Inventors: Thomas PHAN, Albert BAEK, Zheng GUO, Abhishek SINGH
-
Patent number: 8996932Abstract: Embodiments are directed to establishing a model for testing cloud components and to preventing cascading failures in cloud components. In one scenario, a computer system models identified cloud components (including cloud hardware components and/or cloud software components) as health entities. Each health entity is configured to provide state information about the cloud component. The computer system establishes declarative safety conditions which declaratively describe cloud computing conditions that are to be maintained at the identified cloud components. The computer system then tests against the declarative safety conditions to determine which cloud components are or are becoming problematic. Upon determining that an error has occurred, the computer system notifies users of the error and the component at which the error occurred. Guarded interfaces are established to ensure that actions taken to fix the error do not cause further failures.Type: GrantFiled: January 9, 2013Date of Patent: March 31, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Abhishek Singh, Srikanth Raghavan, Ajay Mani, Saad Syed
-
Patent number: 8990944Abstract: Techniques for detecting malicious attacks may monitor activities during execution of content (e.g., network downloads and email) to identify an instruction backdoor on a computer. An instruction backdoor is malware that opens a port for listening for instructions from a remote server. Such instructions may trigger activation of malicious activity. These techniques employ virtual machines that, in a controlled and monitored environment, permit content, when loaded and executed, to open ports. When those ports are not the authorized ones used for communications by known programs installed on the computer, an instruction backdoor is discovered.Type: GrantFiled: February 23, 2013Date of Patent: March 24, 2015Assignee: FireEye, Inc.Inventors: Abhishek Singh, Jayaraman Manni
-
Patent number: 8954725Abstract: Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the packet stream is transmitted in accordance with a particular protocol. The packet is analyzed based on a specification associated with the particular protocol. Based on the analysis, a data value of a field of the packet is replaced with a sanitized data value to create a sanitized packet. The sanitized packet may be injected into the packet stream or may optionally be forwarded to a signature module that checks the sanitized packet for malicious content. When malicious content is found, the sanitized packet may be dropped, the sanitized packet may be logged, the sanitized packet may be redirected, or a notification regarding the sanitized packet may be sent to an administrator.Type: GrantFiled: May 8, 2009Date of Patent: February 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Abhishek Singh, Tanmay A. Ganacharya, Scott Lambert, Nikola J. Livic, Swapnil Bhalode
-
Patent number: 8928541Abstract: An active antenna system and algorithm is proposed that provides for dynamic tuning and optimization of antenna system parameters for a MIMO system that will provide for greater throughput. As one or multiple antennas are loaded or de-tuned due to environmental changes, corrections to correlation and/or isolation are made by tuning the active antenna. A null-steering technique is implemented to alter the near-field and far-field characteristics to aid in modifying correlation and isolation in the multi-antenna system.Type: GrantFiled: November 12, 2012Date of Patent: January 6, 2015Assignee: Ethertronics, Inc.Inventors: Laurent Desclos, Barry Matsumori, Sebastian Rowson, Abhishek Singh
-
Publication number: 20140327578Abstract: A system and method for diversity implementation are provided, where diversity gains are obtained by using a hybrid of the switching technique and the combining technique in conjunction with the use of a modal antenna. The antenna system includes multiple antennas including at least one modal antenna that has multiple modes, and a processor for selecting one or more modes from the multiple modes associated with each of the at least one modal antenna, combining modes to form one or more combinations of modes, the modes in each of the one or more combinations including one of the one or more selected modes associated with each of the at least one modal antenna, and selecting one of the one or more combinations that optimizes correlation and/or a quality metric for diversity.Type: ApplicationFiled: July 21, 2014Publication date: November 6, 2014Applicant: ETHERTRONICS, INC.Inventors: Sebastian Rowson, Jeffrey Shamblin, Laurent Desclos, Abhishek Singh
-
Publication number: 20140201564Abstract: Embodiments described herein are directed to migrating affected services away from a faulted cloud node and to handling faults during an upgrade. In one scenario, a computer system determines that virtual machines running on a first cloud node are in a faulted state. The computer system determines which cloud resources on the first cloud node were allocated to the faulted virtual machine, allocates the determined cloud resources of the first cloud node to a second, different cloud node and re-instantiates the faulted virtual machine on the second, different cloud node using the allocated cloud resources.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: Microsoft CorporationInventors: Gaurav Jagtiani, Abhishek Singh, Ajay Mani, Akram Hassan, Thiruvengadam Venketesan, Saad Syed, Sushant Pramod Rewaskar, Wei Zhao
-
Publication number: 20140195861Abstract: Embodiments are directed to implementing rate controls to limit faults detected by timeout and to learning and adjusting an optimal timeout value. In one scenario, a computer system identifies cloud components that have the potential to fail within a time frame that is specified by a timeout value. The computer system establishes a number of components that are allowed to fail during the time frame specified by the timeout value and further determines that the number of component failures within the time frame specified by the timeout value has exceeded the established number of components that are allowed to fail. In response, the computer system increases the timeout value by a specified amount of time to ensure that fewer than or equal to the established number of components fail within the time frame specified by the timeout value.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: MICROSOFT CORPORATIONInventors: Abhishek Singh, Srikanth Raghavan, Ajay Mani, Saad Syed
-
Publication number: 20140195672Abstract: Embodiments are directed to isolating a cloud computing node using network- or some other type of isolation. In one scenario, a computer system determines that a cloud computing node is no longer responding to monitoring requests. The computer system isolates the determined cloud computing node to ensure that software programs running on the determined cloud computing node are no longer effectual (either the programs no longer produce outputs, or those outputs are not allowed to be transmitted). The computer system also notifies various entities that the determined cloud computing node has been isolated. The node may be isolated by powering the node down, by preventing the node from transmitting and/or receiving data, and by manually isolating the node. In some cases, isolating the node by preventing the node from transmitting and/or receiving data includes deactivating network switch ports used by the determined cloud computing node for data communication.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: Microsoft CorporationInventors: Srikanth Raghavan, Abhishek Singh, Chandan Aggarwal, Fatima Ijaz, Asad Yaqoob, Joshua McKone, Ajay Mani, Matthew Jeremiah Eason, Muhammad Mannan Saleem
-
Publication number: 20140195853Abstract: Embodiments are directed to establishing a model for testing cloud components and to preventing cascading failures in cloud components. In one scenario, a computer system models identified cloud components (including cloud hardware components and/or cloud software components) as health entities. Each health entity is configured to provide state information about the cloud component. The computer system establishes declarative safety conditions which declaratively describe cloud computing conditions that are to be maintained at the identified cloud components. The computer system then tests against the declarative safety conditions to determine which cloud components are or are becoming problematic. Upon determining that an error has occurred, the computer system notifies users of the error and the component at which the error occurred. Guarded interfaces are established to ensure that actions taken to fix the error do not cause further failures.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: MICROSOFT CORPORATIONInventors: Abhishek Singh, Srikanth Raghavan, Ajay Mani, Saad Syed
-
Publication number: 20140181796Abstract: A server device is configured to receive a request to identify a manner in which changed code propagates within an application; generate a group of blocks that correspond to code associated with a parent function corresponding to the application and which includes the changed code; perform an intra-procedural analysis on the group of blocks to identify a block that is affected by the changed code included within an epicenter block; perform an inter-procedural analysis on functions associated with the block, where, when performing the inter-procedural analysis, the server device is to generate another group of blocks associated with the functions, and identify another block that is affected by the changed code included within the epicenter block; and present, for display, information associated with the block or the other block that enables the application to be tested based on the block or the other block.Type: ApplicationFiled: February 28, 2014Publication date: June 26, 2014Applicant: JUNIPER NETWORKS, INC.Inventors: Abhishek SINGH, Sachin Vasudeva
-
Patent number: 8683449Abstract: A server device is configured to receive a request to identify a manner in which changed code propagates within an application; generate a group of blocks that correspond to code associated with a parent function corresponding to the application and which includes the changed code; perform an intra-procedural analysis on the group of blocks to identify a block that is affected by the changed code included within an epicenter block; perform an inter-procedural analysis on functions associated with the block, where, when performing the inter-procedural analysis, the server device is to generate another group of blocks associated with the functions, and identify another block that is affected by the changed code included within the epicenter block; and present, for display, information associated with the block or the other block that enables the application to be tested based on the block or the other block.Type: GrantFiled: October 28, 2010Date of Patent: March 25, 2014Assignee: Juniper Networks, Inc.Inventors: Abhishek Singh, Sachin Vasudeva
-
Publication number: 20140067467Abstract: A system is disclosed for optimizing product merchandising area allocation. One example includes receiving inputs defining financial metrics for product categories. A linear regression model forecasts responses of the financial metrics for the product categories to endogenous variables, which include sales per merchandising area per product category per store and total sales volume per store. Each of the product categories includes a user option to select constraints for either a minimum and maximum of an area in which the product category is displayed, or a minimum and maximum change from a current area in which the product category is displayed. The system generates a merchandising plan that optimizes for the combined total of the financial metrics of the product categories in accordance with the linear regression model, including changes in merchandising area for each of a plurality of the product categories, within the selected constraints.Type: ApplicationFiled: August 31, 2012Publication date: March 6, 2014Applicant: TARGET BRANDS, INC.Inventors: Bharath Kumar Rangarajan, James C. Nelson, Abhishek Singh Verma
-
Publication number: 20130211829Abstract: Various methods and systems are provided for related to adaptive systems using correntropy. In one embodiment, a signal processing device includes a processing unit and a memory storing an adaptive system executable in the at least one processing unit. The adaptive system includes modules that, when executed by the processing unit, cause the signal processing device to adaptively filter a desired signal using a correntropy cost function. In another embodiment, a method includes adjusting a coefficient of an adaptive filter based at least in part on a correntropy cost function signal, providing an adaptive filter output signal based at least in part on the adjusted coefficient and a reference signal, and determining an error signal based at least in part on a received signal and the adaptive filter output signal.Type: ApplicationFiled: February 11, 2011Publication date: August 15, 2013Inventors: Jose Carlos Principe, Abhishek Singh, Weifeng ` Liu
-
Patent number: 8479188Abstract: A human-readable list of patch differences ranked by weight helps vulnerability analysts allocate their time. From binary code, identified source functions and recognized sink functions are used when assigning relative weights to changes caused by a patch. Source functions are identified using an export table, import table, and remote procedure call interface. Sink functions are recognized using blacklisted functions, patch-targeted functions, memory functions, string functions, and functions called with mismatched parameters. A change prioritizer assigns weights based on an architectural graph and a set of prioritization rules that specify what kind of change is made by a patch, and what kind of function is changed. Weight assignments may be additive. Rules may assign certain kinds of change a higher priority for subsequent scrutiny by an analyst.Type: GrantFiled: July 8, 2010Date of Patent: July 2, 2013Assignee: Microsoft CorporationInventors: Abhishek Singh, Tanmay Ganacharya, Scott Lambert